SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7205 59
WIRELESS ADHOC MULTI ACCESS NETWORKS
OPTIMIZATION USING OSPF ROUTING
PROTOCOL BASED ON CISCO DEVICES.
Mohamed E. Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky
Department of Electronics and Communications, Arab Academy for Science, Tech. and
Maritime Transport, Alexandria, Egypt, BOX 1029
ABSTRACT
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
KEYWORDS
Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices.
1.INTRODUCTION:
Fig1. Default Administrative Distance
The OSPF routing protocol history is designed especially on the links state (Link speed) over
view due to Djkstra algorithm. It began to operate in the world in 1987 then the released was been
made.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
60
Fig2. OSPF Development timeline
2. ILLUSTRATING THE PROBLEM:
This paper aim is actually to make all end devices under coverage area and under control. adhoc
network of multi-access end devices major issue is the time delay and Packets which dropped
during the transmission process. OSPF Routing Protocol can be handled in this paper because of
its high signal transmission ratio, average administrative routing protocol distance, high
authentication and encryption algorithm that already defined. OSPF primary feature is the using
of the links speed only however all other protocols used the hops as primary feature. This will
gain much more accurate results in the Adhoc wireless networking case.
3.OSPF working phenomena:
OSPF invented to correct the wrong paths made by RIP Routing Protocol. Whichinvented by the
routing table entry algorithm called BelmmanFord (Hops Theory).[1]Note that Network Layer
(Layer3) on the Open System Interconnection (OSI) model will be ussed. The packet
encapsulation in the sending criteria must be defined as OSPF Message Encapsulation packet
header contains router ID, area ID and Type code for OSPF packet type.
Fig3. Encapsulation OSPF Message
Internet Protocol (IP) packet header contains source IP address, destination IP address and
protocol field set to 89.[2] The data link frame header contains source Multi Access Card (MAC)
address and Destination MAC address. There are 5 types of packet messages for the OSPF listed
as bellow.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
61
Fig.4 OSPF Packets Type
OSPF not only good due to administrative distance but also it is very good in the authentication
andencryption purposes for important data. Routers will only accept routing information from
other routers that have been configured with the same password or authentication information
Fig.5 Showing Authentication
4. USED NETWORK’S DEVICES:
It is urgent to use network devices in this research, that’s why routing must be made using high
speed, reliable routers. This options are only exists in cisco devices. So a 3X 2600 series cisco
routers (2621XM) routers with 2 -38db antennas will be used to make sure the coverage are is
good enough and can cover about 1Km.[3]
Fig.6. Cisco 2800 Series Catalyst Router
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
62
5. DESIGNED SCHEMA TO WORK ON:
This schema is designed using Cisco packet tracer simulator. We will use 3 2611xm routers as
mentioned. The 3 routers connected directly by smart serial interfaces not wirelessly (to check the
connection first).[4] The DCE interfaces used only to establish the connection with the universal
rate of 64000 bit/sec. every router have its own network of end devices. Ip configuration as listed
below and as shown and configured in Appendix A, B and C:
Table1: Schema Design
Device/interface IP Address+
Subnet mask
Device/interface IP Address+
Subnet mask
Adhoc 1 172.16.1.18
255.255.255.192
R3/Lo0 10.3.3.3
255.255.255.255
Adhoc 2 10.10.10.2
255.255.255.0
R3/S0/0/0 192.168.10.5
255.255.255.252
Adhoc 3 172.16.1.35
255.255.255.248
R3/S0/0/1 192.168.10.10
255.255.255.252
R1/Lo0 10.1.1.1
255.255.255.255
R1 – R2 Cost 64 Kbps
R1/S0/0/0 192.168.10.1
255.255.255.252
R2-R3 Cost 128 Kbps
R1/S0/0/1 192.168.10.6
255.255.255.252
R1-R3 Cost 256 Kbps
R2/Lo0 10.2.2.2
255.255.255.255
R1 LAN 172.16.1.16
255.255.255.192
R2/S0/0/0 192.168.10.2
255.255.255.252
R2 LAN 10.10.10.0
255.255.255.0
R2/S0/0/1 192.168.10.9
255.255.255.252
R3 LAN 172.16.1.32
255.255.255.248
Fig7. OSPF Path cost (a)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
63
6. OSPFPATH COST METRIC
Usually there is a difference in actual bandwidth and the used bandwidth [5].So, the actual speed
can be determined using the bandwidth. The main Reason is the routing table has best path
information. The show interface command will display interface’s bandwidth. Serial links used as
shown in as bellow figure.
Fig8. OSPF Path Cost (b)
7. CONFIGURATION OF OSPF ROUTER
Configuration the path cost of a must be configured in link both sides of a serial link should be
configured with the samebandwidth. Commands used to modify bandwidth valueBandwidth
command
Router(config-if)#bandwidth 64
Fig9. OSPF bandwidth configuration
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
64
Fig10. OSPF bandwidth configuration
Editing the Cost of the link linking between bandwidth command and the ipospf path cot
command. Ipospf cost command. Sets cost to a specific value then the calculated OSPF Cost
already calculated.[6]
Fig11. Equivalent commands of bandwidth and ip PSPF commands
8. OSPF AND MULTI-ACCESS NETWORKS
Differences in Multi-access Networks, Point-to-point.[7]Broadcast Multi-access, Non
broadcastMulti-access (NBMA), Point-to-multipoint and virtual links.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
65
Fig12. OSPF Network types used
2 challenges presented by multi-access networks, multiple adjacencies and Extensive Link State
Advertisement (LSA) flooding.[8]
Fig13. No. Of Growth of paths
an acknowledgement of receipt must be sent back to transmitting router due to flooding of LSA
and . [9]
Fig14. LSA Flooding Scenario
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
66
Solution to LSA flooding issue is the use of designated router (DR) and Backup designated router
(BDR). The DR & BDR selection is Routers are elected to send and receive LSA.[10]
Fig15. DR/BDR Listens.
Various DR routers send LSAs through multicast ip address of 224.0.0.6 to DR & BDRrouters
,DR forward LSA via multicast address 224.0.0.5 to all other routers.[11]
Fig16. DR sends LSAs
9.CONCLUSIONS
Using OSPF in Multi-access networks of wireless Adhoc with cisco solutions products like
routers, switches and access points; it can be easy to make the entire network under coverage with
minimum time delay and legacy. In this paper, Appling on real life network as it is and with all
right configurations of OSPF on routers, we were able to decrease the time delay and legacy from
22mSec to only 12mSec. This will define a revolution in the adhoc networking in fields of time
based like military services.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
67
REFERENCES
[1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html
[2] SharamHekmat, Communication Networks, 2011
[3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013
[4] Patricegilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April
2011.
[5] Yi-Bing Lin &ImrichChlamtac, Wireless and Mobile network architectures, 2012
[6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013
[7] Simon Haykin, Communication Systems, fifth edition, 2014
[8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet,
2014
[9] Andrew S.Tanenbaum, Computer Network, 2012
[10] J. Walrand& P. Varaiya, High-Performance Communication Networks, 2014
[11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014
Appendix A
Controller (Routers) Configuration
For Controller 1:
Router>enable
Router#configure terminal
Router(config)#hostname Base 1
Controller1(config)#interface fastEthernet 0/0
Controller1(config-if)#ip address 172.16.1.18 255.255.255.192
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller1(config-if)#ip address 11.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller1(config)#interface serial 0/3/0
Controller1(config-if)#ip address 12.0.0.1 255.0.0.0
Controller1(config-if)#clock rate 64000
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller1(config)#line console 0
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#line vty 0 4
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
68
Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2
Appendix B
For Controller 2:
Router>enable
Router#configure terminal
Router(config)#hostname Base2
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 13.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.2 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Appendix C
For Controller 3:
Router>enable
Router#configure terminal
Router(config)#hostname Base3
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
69
Controller2(config-if)#ip address 15.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.3 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Authors
Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and
Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and
the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical
Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at
AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at
Ottawa University, Ottawa, Canada. From 2005 to 2009, he was an assistant Professor at AAST,
Department of Electronic and communications Engineering, Alexandria, Egypt. Since January 2009, He
has been an Associate professor at AAST, Department of Electronic and communications Engineering,
Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA.
Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in
1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic
wave in 2002 he works as doctor at Arab academy for science and Technology in electronic
and communication department
.
Mohamed I. El-Desoukywas born in 1989 in Alex, Egypt, graduate as electrical, Electronics
and Communications engineer from The Arab Academy for Science, Technology and
Maritime Transport in 2010, has started preparation his master from the same institute of
graduation in 2011.

More Related Content

What's hot

477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerIOSR Journals
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
 
Ethernet Compliance Testing at Toradex
Ethernet Compliance Testing at ToradexEthernet Compliance Testing at Toradex
Ethernet Compliance Testing at ToradexToradex
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
 
Sdh/pdh/sonet
Sdh/pdh/sonetSdh/pdh/sonet
Sdh/pdh/sonetLEKHRAJ .
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Communication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet NetworkCommunication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet NetworkIJERA Editor
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
 

What's hot (19)

Ijebea14 238
Ijebea14 238Ijebea14 238
Ijebea14 238
 
IJSTEV2I12120
IJSTEV2I12120IJSTEV2I12120
IJSTEV2I12120
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Ch5
Ch5Ch5
Ch5
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Ethernet Compliance Testing at Toradex
Ethernet Compliance Testing at ToradexEthernet Compliance Testing at Toradex
Ethernet Compliance Testing at Toradex
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
 
Sdh/pdh/sonet
Sdh/pdh/sonetSdh/pdh/sonet
Sdh/pdh/sonet
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
Cr33562566
Cr33562566Cr33562566
Cr33562566
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Fc
FcFc
Fc
 
Introductin sdh-pdh
Introductin sdh-pdhIntroductin sdh-pdh
Introductin sdh-pdh
 
Communication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet NetworkCommunication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet Network
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
 

Viewers also liked

PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm forIJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensorIJCNCJournal
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteedIJCNCJournal
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on textIJCNCJournal
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with videoIJCNCJournal
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 

Viewers also liked (19)

PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 

Similar to Wireless adhoc multi access networks

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfKOLOYOYO
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulationiosrjce
 

Similar to Wireless adhoc multi access networks (20)

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulation
 
H010634043
H010634043H010634043
H010634043
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Wireless adhoc multi access networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 DOI : 10.5121/ijcnc.2015.7205 59 WIRELESS ADHOC MULTI ACCESS NETWORKS OPTIMIZATION USING OSPF ROUTING PROTOCOL BASED ON CISCO DEVICES. Mohamed E. Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky Department of Electronics and Communications, Arab Academy for Science, Tech. and Maritime Transport, Alexandria, Egypt, BOX 1029 ABSTRACT One of the most attractive field for research for researchers and authors so the Wireless adhoc networks. So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands. Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access wireless networks. This paper will use OSPF routing protocol because of its average administrative distance with all routing protocols. KEYWORDS Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices. 1.INTRODUCTION: Fig1. Default Administrative Distance The OSPF routing protocol history is designed especially on the links state (Link speed) over view due to Djkstra algorithm. It began to operate in the world in 1987 then the released was been made.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 60 Fig2. OSPF Development timeline 2. ILLUSTRATING THE PROBLEM: This paper aim is actually to make all end devices under coverage area and under control. adhoc network of multi-access end devices major issue is the time delay and Packets which dropped during the transmission process. OSPF Routing Protocol can be handled in this paper because of its high signal transmission ratio, average administrative routing protocol distance, high authentication and encryption algorithm that already defined. OSPF primary feature is the using of the links speed only however all other protocols used the hops as primary feature. This will gain much more accurate results in the Adhoc wireless networking case. 3.OSPF working phenomena: OSPF invented to correct the wrong paths made by RIP Routing Protocol. Whichinvented by the routing table entry algorithm called BelmmanFord (Hops Theory).[1]Note that Network Layer (Layer3) on the Open System Interconnection (OSI) model will be ussed. The packet encapsulation in the sending criteria must be defined as OSPF Message Encapsulation packet header contains router ID, area ID and Type code for OSPF packet type. Fig3. Encapsulation OSPF Message Internet Protocol (IP) packet header contains source IP address, destination IP address and protocol field set to 89.[2] The data link frame header contains source Multi Access Card (MAC) address and Destination MAC address. There are 5 types of packet messages for the OSPF listed as bellow.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 61 Fig.4 OSPF Packets Type OSPF not only good due to administrative distance but also it is very good in the authentication andencryption purposes for important data. Routers will only accept routing information from other routers that have been configured with the same password or authentication information Fig.5 Showing Authentication 4. USED NETWORK’S DEVICES: It is urgent to use network devices in this research, that’s why routing must be made using high speed, reliable routers. This options are only exists in cisco devices. So a 3X 2600 series cisco routers (2621XM) routers with 2 -38db antennas will be used to make sure the coverage are is good enough and can cover about 1Km.[3] Fig.6. Cisco 2800 Series Catalyst Router
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 62 5. DESIGNED SCHEMA TO WORK ON: This schema is designed using Cisco packet tracer simulator. We will use 3 2611xm routers as mentioned. The 3 routers connected directly by smart serial interfaces not wirelessly (to check the connection first).[4] The DCE interfaces used only to establish the connection with the universal rate of 64000 bit/sec. every router have its own network of end devices. Ip configuration as listed below and as shown and configured in Appendix A, B and C: Table1: Schema Design Device/interface IP Address+ Subnet mask Device/interface IP Address+ Subnet mask Adhoc 1 172.16.1.18 255.255.255.192 R3/Lo0 10.3.3.3 255.255.255.255 Adhoc 2 10.10.10.2 255.255.255.0 R3/S0/0/0 192.168.10.5 255.255.255.252 Adhoc 3 172.16.1.35 255.255.255.248 R3/S0/0/1 192.168.10.10 255.255.255.252 R1/Lo0 10.1.1.1 255.255.255.255 R1 – R2 Cost 64 Kbps R1/S0/0/0 192.168.10.1 255.255.255.252 R2-R3 Cost 128 Kbps R1/S0/0/1 192.168.10.6 255.255.255.252 R1-R3 Cost 256 Kbps R2/Lo0 10.2.2.2 255.255.255.255 R1 LAN 172.16.1.16 255.255.255.192 R2/S0/0/0 192.168.10.2 255.255.255.252 R2 LAN 10.10.10.0 255.255.255.0 R2/S0/0/1 192.168.10.9 255.255.255.252 R3 LAN 172.16.1.32 255.255.255.248 Fig7. OSPF Path cost (a)
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 63 6. OSPFPATH COST METRIC Usually there is a difference in actual bandwidth and the used bandwidth [5].So, the actual speed can be determined using the bandwidth. The main Reason is the routing table has best path information. The show interface command will display interface’s bandwidth. Serial links used as shown in as bellow figure. Fig8. OSPF Path Cost (b) 7. CONFIGURATION OF OSPF ROUTER Configuration the path cost of a must be configured in link both sides of a serial link should be configured with the samebandwidth. Commands used to modify bandwidth valueBandwidth command Router(config-if)#bandwidth 64 Fig9. OSPF bandwidth configuration
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 64 Fig10. OSPF bandwidth configuration Editing the Cost of the link linking between bandwidth command and the ipospf path cot command. Ipospf cost command. Sets cost to a specific value then the calculated OSPF Cost already calculated.[6] Fig11. Equivalent commands of bandwidth and ip PSPF commands 8. OSPF AND MULTI-ACCESS NETWORKS Differences in Multi-access Networks, Point-to-point.[7]Broadcast Multi-access, Non broadcastMulti-access (NBMA), Point-to-multipoint and virtual links.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 65 Fig12. OSPF Network types used 2 challenges presented by multi-access networks, multiple adjacencies and Extensive Link State Advertisement (LSA) flooding.[8] Fig13. No. Of Growth of paths an acknowledgement of receipt must be sent back to transmitting router due to flooding of LSA and . [9] Fig14. LSA Flooding Scenario
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 66 Solution to LSA flooding issue is the use of designated router (DR) and Backup designated router (BDR). The DR & BDR selection is Routers are elected to send and receive LSA.[10] Fig15. DR/BDR Listens. Various DR routers send LSAs through multicast ip address of 224.0.0.6 to DR & BDRrouters ,DR forward LSA via multicast address 224.0.0.5 to all other routers.[11] Fig16. DR sends LSAs 9.CONCLUSIONS Using OSPF in Multi-access networks of wireless Adhoc with cisco solutions products like routers, switches and access points; it can be easy to make the entire network under coverage with minimum time delay and legacy. In this paper, Appling on real life network as it is and with all right configurations of OSPF on routers, we were able to decrease the time delay and legacy from 22mSec to only 12mSec. This will define a revolution in the adhoc networking in fields of time based like military services.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 67 REFERENCES [1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html [2] SharamHekmat, Communication Networks, 2011 [3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013 [4] Patricegilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April 2011. [5] Yi-Bing Lin &ImrichChlamtac, Wireless and Mobile network architectures, 2012 [6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013 [7] Simon Haykin, Communication Systems, fifth edition, 2014 [8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 2014 [9] Andrew S.Tanenbaum, Computer Network, 2012 [10] J. Walrand& P. Varaiya, High-Performance Communication Networks, 2014 [11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014 Appendix A Controller (Routers) Configuration For Controller 1: Router>enable Router#configure terminal Router(config)#hostname Base 1 Controller1(config)#interface fastEthernet 0/0 Controller1(config-if)#ip address 172.16.1.18 255.255.255.192 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller1(config-if)#ip address 11.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller1(config)#interface serial 0/3/0 Controller1(config-if)#ip address 12.0.0.1 255.0.0.0 Controller1(config-if)#clock rate 64000 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller1(config)#line console 0 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#line vty 0 4 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 68 Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 Appendix B For Controller 2: Router>enable Router#configure terminal Router(config)#hostname Base2 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 13.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.2 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1 Appendix C For Controller 3: Router>enable Router#configure terminal Router(config)#hostname Base3 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 69 Controller2(config-if)#ip address 15.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.3 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1 Authors Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at Ottawa University, Ottawa, Canada. From 2005 to 2009, he was an assistant Professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt. Since January 2009, He has been an Associate professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA. Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in 1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and Technology in electronic and communication department . Mohamed I. El-Desoukywas born in 1989 in Alex, Egypt, graduate as electrical, Electronics and Communications engineer from The Arab Academy for Science, Technology and Maritime Transport in 2010, has started preparation his master from the same institute of graduation in 2011.